blob: bb0ca9fce9ce5a8081eea7a121cbd8aae9531b72 [file] [log] [blame]
Armin Ronacher5cdc1ac2008-05-07 12:17:18 +02001Sandbox
2=======
3
4The Jinja2 sandbox can be used to evaluate untrusted code. Access to unsafe
5attributes and methods is prohibited.
6
7Assuming `env` is a :class:`SandboxedEnvironment` in the default configuration
8the following piece of code shows how it works:
9
10>>> env.from_string("{{ func.func_code }}").render(func=lambda:None)
11u''
12>>> env.from_string("{{ func.func_code.do_something }}").render(func=lambda:None)
13Traceback (most recent call last):
14 ...
15SecurityError: access to attribute 'func_code' of 'function' object is unsafe.
16
17
18.. module:: jinja2.sandbox
19
20.. autoclass:: SandboxedEnvironment([options])
21 :members: is_safe_attribute, is_safe_callable
22
Armin Ronacher522cad62008-05-17 13:55:37 +020023.. autoclass:: ImmutableSandboxedEnvironment([options])
24
Armin Ronacher5cdc1ac2008-05-07 12:17:18 +020025.. autoexception:: SecurityError
26
27.. autofunction:: unsafe
28
29.. autofunction:: is_internal_attribute
Armin Ronacher522cad62008-05-17 13:55:37 +020030
Armin Ronacherd71fff02008-05-26 23:57:07 +020031.. autofunction:: modifies_known_mutable
Armin Ronacher9bb7e472008-05-28 11:26:59 +020032
33.. admonition:: Note
34
35 The Jinja2 sandbox alone is no solution for perfect security. Especially
36 for web applications you have to keep in mind that users may create
37 templates with arbitrary HTML in so it's crucial to ensure that (if you
38 are running multiple users on the same server) they can't harm each other
39 via JavaScript insertions and much more.
40
41 Also the sandbox is only as good as the configuration. We stronly
42 recommend only passing non-shared resources to the template and use
43 some sort of whitelisting for attributes.
44
45 Also keep in mind that templates may raise runtime or compile time errors,
46 so make sure to catch them.